Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 12 Nov 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Engenius
Engenius ews356 Fit |
|
| Weaknesses | CWE-78 | |
| CPEs | cpe:2.3:o:engenius:ews356_fit:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Engenius
Engenius ews356 Fit |
|
| Metrics |
cvssV3_1
|
Mon, 11 Nov 2024 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | EnGenius EWS356-FIT devices through 1.1.30 allow blind OS command injection. This allows an attacker to execute arbitrary OS commands via shell metacharacters to the Ping and Speed Test utilities. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-11-12T16:27:15.034Z
Reserved: 2024-05-19T00:00:00
Link: CVE-2024-36061
Updated: 2024-11-12T16:26:15.845Z
Status : Awaiting Analysis
Published: 2024-11-11T20:15:17.673
Modified: 2024-11-12T17:35:07.450
Link: CVE-2024-36061
No data.
OpenCVE Enrichment
No data.